Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Data Masking agent can be used to either mask or unmask specified fields in different UDRs in order to protect the data. It can be used when data is going to be processed in the cloud without involving personal data, for example. The agent enables compliance with regulations around data protection, ensuring personal data is accessed in a controlled manner.

Image RemovedImage Added

The agent uses a profile in which you can define the masking method; Crypto, Database, or Hash, as well as which fields to mask/unmask along with additional settings specific for each masking method. When selecting Database, Oracle, Postgres, and SAP HANA can be used.

In the agent itself, you can select which of the UDR types configured in the used profile(s) that you want the agent to process, as well as how you want the agent to handle unmatching data.

...

  • Encryption/decryption with AES-128 and AES-256
  • Reading a key from a specific JCEKS keystore
  • Generation and storage of replacement data in a Database
  • Converting input data to random data based on SHA-256 hash
  • Use of multiple profiles in the agent
  • Error handling
  • Logging


Scroll ignore
scroll-viewportfalse
scroll-pdftrue
scroll-officefalse
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmlfalse

The section contains the following subsections: